Electronic signatures

Electronic signatures are closely associated with encryption. An electronic signature verifies that the person who originated the data is the author and that no one has tampered with the data. Users can add an electronic signature to mail messages and to fields and sections of documents. A database designer controls whether or not users can sign fields and sections of a database can be signed; individual users can choose to sign mail messages.

Users can sign mail messages sent to other Notes® users or to users of other mail applications that support the S/MIME protocol -- for example, Microsoft™ Outlook Express®. Domino® uses the same keys used for encryption -- the Notes and Internet public and private keys -- for electronic signatures.

You can also set up Notes to use separate keys for S/MIME signatures and encryption, by adding two Internet certificates to your Notes ID file and using one certificate for S/MIME encryption and the other for S/MIME signatures and SSL client authentication. Having dual Internet certificates lets you maintain separate public and private key pairs for encryption and electronic signatures and SSL client authentication.

For information on creating signed fields and sections, see the topic Enabling encryption in a field in IBM® Domino Designer 9.0.1 Social Edition Help.

Notes signatures

When the sender signs a message with a Notes signature, all fields of the message are signed.

  1. Notes generates a "hash" of the data -- that is, a number that represents the data -- and then encrypts the hash with the private key of the author of the data, forming a signature. The hash is also sometimes called a message digest, and has some necessary special properties:
    • It is not possible to guess the original message from looking at the digest.
    • Even a small change in the message changes the digest in an unpredictable way, and produces a completely different value.
  2. Notes attaches the signature, the signer's public key, and the signer's certificates to the data.
  3. When the reader accesses the signed data, Notes verifies that the signer has a common certificate or common certificate ancestor from a certifier that the reader trusts. If so, Notes attempts to decrypt the signature using the public key that corresponds to the private key with which the data was signed.
  4. If decryption is successful, Notes indicates who signed the message. If decryption is unsuccessful, Notes indicates that it cannot verify the signature. Unsuccessful decryption and comparison may indicate that the data has been tampered with.
    Note: Certificate trust checking occurs independently of hash decryption and comparison. Decryption and comparison may succeed even if the certificate is not trusted. This might happen, for example, when a user receives mail from a user in another company and that user doesn't have a cross-certificate.

S/MIME signatures

When the sender signs a message with an S/MIME signature, only the body of the message and accompanying attachments are signed.

  1. Notes generates a hash of the data being signed and then encrypts the hash with the private key of the author of the data, forming a signature.
  2. Notes attaches a certificate chain -- that is, all certificates in the hierarchy for the certificate -- and the signature to the data.
  3. When the reader accesses the signed data, Notes or the mail application attempts to decrypt the signature using the public key that corresponds to the private key with which the data was signed. If successful, Notes or the application verifies that the signer has a common certificate or common certificate ancestor from a certifier that the reader trusts.
    Note: Typically, the Notes user's organizational certifier issues a cross-certificate to the signer's certificate authority (CA). Trust can also be established if the Notes user issues a cross-certificate directly to the signer's certificate or to the signer's Certificate Authority. Or, the Notes user's organizational certifier can issue a cross-certificate directly to the signer's certificate.
  4. Notes or the mail application compares the decrypted hash with a hash of the message generated by the reader. A match means that the signature is valid.
  5. If the digest comparison is successful, Notes or the S/MIME mail application indicates who signed the message. If decryption is unsuccessful, the application indicates that it could not verify the signature. Unsuccessful decryption and comparison may indicate that the data has been tampered with.
    Note: Certificate trust checking occurs independently of hash decryption and comparison. Decryption and comparison may succeed even if the certificate is not trusted. This might happen, for example, when a user receives mail from a user in another company and that user doesn't have a cross-certificate.

Signing sent mail

Notes client users control whether the mail they send is signed. Users can sign individual mail messages or sign all mail messages that they send. When sending signed messages to users of S/MIME mail applications, Notes users must have an additional set of Internet public and private keys.

For information about signing mail, see the topic Encrypting and digitally signing email messages in IBM Notes 9.0.1 Social Edition Help.